A Characterization of Cybersecurity Posture from Network Telescope Data
نویسندگان
چکیده
Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA’s network telescope during the month of March 2013. We propose to formalize the concept of cybersecurity posture from the perspectives of three kinds of time series: the number of victims (i.e., telescope IP addresses that are attacked), the number of attackers that are observed by the telescope, and the number of attacks that are observed by the telescope. Characterizing cybersecurity posture therefore becomes investigating the phenomena and statistical properties exhibited by these time series, and explaining their cybersecurity meanings. For example, we propose the concept of sweep-time, and show that sweep-time should be modeled by stochastic process, rather than random variable. We report that the number of attackers (and attacks) from a certain country dominates the total number of attackers (and attacks) that are observed by the telescope. We also show that substantially smaller network telescopes might not be as useful as a large telescope. keywords: Cybersecurity data analytics, cybersecurity posture, network telescope, network blackhole, darknet, cyber attack sweep-time, time series data
منابع مشابه
Cybersecurity Practices for E-Government: An Assessment in Bhutan
The main goal of e-government implementation is to improve the effectiveness, efficiency and quality of public service delivery using Information and Communication Technologies (ICT). However, its success is dependent on the provision of information security goals such as confidentiality, integrity, availability and trust. Therefore, cybersecurity is vital for the successful adoption of e-gover...
متن کاملAn Evaluation of Security Posture Assessment Tools on a SCADA Environment
Increased concerns for energy grid cybersecurity has lead to the development of compliance requirements that must be evaluated by utilities. The North American Electric Reliability Council (NERC) has created Critical Infrastructure Protection (CIP) requirements for all cyber assets supporting the bulk energy system [17]. This research explores whether the methodologies and tools commonly used f...
متن کاملExploring Critical Success Factors for Cybersecurity in Bhutan’s Government Organizations
This paper presents the results of open-ended survey exploring the critical success factors for cybersecurity implementation in government organisations in Bhutan. Successful implementation of cybersecurity depends on a thorough understanding of cyber threats and challenges to the organisational information assets. It also depends on identification of a responsible, dedicated personnel to lead ...
متن کاملDevising Game-changing Approaches to Cybersecurity’s Hard Problems
depend on the technologies that implement cyberspace. Secure systems must be dependable, and dependable systems fail if not secured. Unreliable software is inherently insecure. Unfortunately, cybersecurity practice and policy are largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this predominantly reactive posture w...
متن کاملDouble-Star Detection Using Convolutional Neural Network in Atmospheric Turbulence
In this paper, we investigate the usage of machine learning in the detection and recognition of double stars. To do this, numerous images including one star and double stars are simulated. Then, 100 terms of Zernike expansion with random coefficients are considered as aberrations to impose on the aforementioned images. Also, a telescope with a specific aperture is simulated. In this work, two k...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014